Cyberattacks: Page 30


  • Image attribution tooltip
    Max Pixel
    Image attribution tooltip

    25% of providers saw mortality rates rise after ransomware attacks, survey finds

    This study of health delivery organizations is one of the first finding a direct impact on patient care. It comes roughly a year after a patient in Germany died as a result of delayed care following a ransomware attack.

    By Rebecca Pifer • Sept. 27, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Ripple effects from a cyber incident take a year to develop: report

    Organizations are likely to both generate and suffer the downstream consequences of cyber incidents because of the technological reliance companies have on one another.

    By Samantha Schwartz • Sept. 27, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Ransomware compromises customer data in farm co-op attack

    A Minnesota-based co-op became the second agricultural firm in recent days to be the target of ransomware, just weeks after the FBI and CISA warned of a wider threat to the industry.

    By Updated Sept. 24, 2021
  • Corn field and a house.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    BlackMatter gang targets Iowa agriculture cooperative in a test of critical infrastructure

    Iowa-based New Cooperative, one of the largest grain suppliers in the state, is facing a demand to pay $5.9 million in ransom.

    By Sept. 21, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    What to know about software bill of materials

    The Biden administration wants more transparency in the software supply chain. Will private industry join in?

    By Samantha Schwartz • Sept. 20, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Companies must develop operational plan for ransomware recovery

    In the face of more frequent and sophisticated attacks, companies need to identify their most critical assets and work to limit cyberattack fallout.

    By Sept. 17, 2021
  • 'Big game hunters': Ransomware groups target their perfect victim

    Research from KELA found U.S. companies with upwards of $100 million in revenue are favored targets.

    By Samantha Schwartz • Sept. 13, 2021
  • BlueVoyant ransomware ride along press release 1
    Image attribution tooltip
    Permission granted by Screenshot via BlueVoyant
    Image attribution tooltip

    What ransomware negotiations look like

    Fear can overwhelm the decision of whether to pay a ransom. But in negotiations, companies have to take a backseat.

    By Samantha Schwartz • Sept. 9, 2021
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    What's at stake in a credential stuffing attack

    Attackers gain a network foothold by using stolen credentials under the guise of an authenticated trusted employee or third party.

    By Sue Poremba • Sept. 1, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Why a ban on ransom payments will not work

    Those most impacted by an attack are motivated to pay. In some cases, it's not the victim company but its customers who want service restored.

    By Samantha Schwartz • Aug. 27, 2021
  • Photo of health visual at cybersecurity HIMSS21
    Image attribution tooltip
    Rebecca Pifer/Cybersecurity Dive
    Image attribution tooltip

    Should healthcare organizations pay to settle a ransomware attack?

    The decision goes beyond finances: In healthcare, it's a moral judgement, too.  "I don't think there's a single yes or no," said Michael Coates, former Twitter CISO.

    By Rebecca Pifer • Aug. 13, 2021
  • Image attribution tooltip
    Dean Mouhtaropoulos via Getty Images
    Image attribution tooltip

    Criminal middlemen administer access to privileged accounts

    Ransomware attacks stem from a specialized division of labor selling stolen credentials and providing unauthorized access to the enterprise, according to an IntSights report. 

    By Aug. 12, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Researchers withholding vulnerabilities can create path to supply chain hacks

    Bug bounty programs incentivize researchers to fully develop vulnerabilities by offering higher payouts. But that can create risk for the enterprise, Corellium's Matt Tait said.

    By Samantha Schwartz • Aug. 5, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Initial access brokers sell a way in, widening the ransomware market

    The most popular network access points sold on the dark web offer insight for security teams to better understand what is most vulnerable to ransomware.

    By Samantha Schwartz • Aug. 2, 2021
  • A JBS meatpacking plant in Greeley, Colorado.
    Image attribution tooltip
    Matthew Stockman/Getty via Getty Images
    Image attribution tooltip

    Ransomware, supply chain attacks put cyber insurers on notice

    Malicious cyber activity will force the insurance industry to raise premiums, raise standards and, in some cases, negotiate ransom payments, newly released data from Coalition shows.

    By July 28, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Pipeline operators raise concerns over aggressive TSA cybersecurity directives

    Many of the agency's directives are rooted in basic cybersecurity hygiene, not necessarily lengthy digital transformation efforts, the TSA administrator said. 

    By Samantha Schwartz • July 28, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    OT cyberattacks could threaten human safety by 2025: Gartner

    Critical infrastructure facilities are struggling to contain sophisticated malware and ransomware threats, Gartner research shows.

    By July 26, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    No ransom paid to obtain decryptor, Kaseya says

    After consulting with experts, Kaseya said it decided not to negotiate with the criminals behind the attack.

    By Updated July 27, 2021
  • Businesspeople
    Image attribution tooltip
    Industry Dive/Cybersecurity Dive, data from Industry Dive
    Image attribution tooltip

    How to keep business operations running after a cyber incident

    While companies need to move quickly to mitigate the cyber event, they're also starting from behind. Once an incident happens, businesses have to catch up.

    By Sue Poremba • July 23, 2021
  • Image attribution tooltip
    Lintao Zhang via Getty Images
    Image attribution tooltip

    White House ties cyberattacks to China, but private sector awaits stronger action

    Security leaders urge more forceful action after the U.S. accused China of backing a campaign of malicious cyberattacks, including the early 2021 attacks against Microsoft Exchange server.

    By July 20, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Kaseya restores SaaS monitoring service after REvil ransomware attack

    The IT monitoring and management provider is working to restore service for on-premises customers after extensive hardening to protect against a future attack. 

    By July 12, 2021
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Kaseya: What's known (and unknown) about the ransomware attack

    The historic ransomware attack against the remote-monitoring provider leaves a number of outstanding questions. 

    By Updated July 12, 2021
  • Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Kaseya postpones service restoration, apologizes for attack

    Outside engineers warned that Kaseya needs additional layers of protection as pre-existing vulnerabilities are revealed.

    By July 8, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Kaseya misses first attempt to restore SaaS following REvil attack

    The scope of the ransomware attack began to emerge, as thousands of SMBs and other organizations returned to work only to find systems compromised.

    By July 7, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Kaseya wrestles with service restoration following supply chain attack

    The company is working with federal officials to recover from a ransomware attack that Kaseya said impacted up to 1,500 downstream customers.

    By July 6, 2021